Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 19:21
Behavioral task
behavioral1
Sample
e0acb0ce0c4386d90903c7c5b0811c31b17fe4f17f4c63d6ee8ec36b81ab0275.dll
Resource
win7-20241010-en
General
-
Target
e0acb0ce0c4386d90903c7c5b0811c31b17fe4f17f4c63d6ee8ec36b81ab0275.dll
-
Size
1.3MB
-
MD5
6bccf89a5a61e1fd4085adaec59523f0
-
SHA1
330fa85aae89a2fbd7a21fa7b8e7496e5ccf6333
-
SHA256
e0acb0ce0c4386d90903c7c5b0811c31b17fe4f17f4c63d6ee8ec36b81ab0275
-
SHA512
fdfac23417e77d9d1d2152b646340a8ee206a29b04d5dfbc372bab3325b6b0a012929bdbb98441e59cbdbe9b63040bd137145ad2c65df1d64c5966354bc86743
-
SSDEEP
24576:qncFdcHdOgxk3F8TGFnnH0vySpIfAls7JxTUqqZm1i:hcEHn9IIfbLTRKmA
Malware Config
Extracted
danabot
4
192.119.110.73:443
192.236.147.159:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
Signatures
-
Danabot Loader Component 1 IoCs
Processes:
resource yara_rule behavioral2/memory/64-0-0x0000000000400000-0x0000000000564000-memory.dmp DanabotLoader2021 -
Danabot family
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 7 64 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2468 wrote to memory of 64 2468 rundll32.exe rundll32.exe PID 2468 wrote to memory of 64 2468 rundll32.exe rundll32.exe PID 2468 wrote to memory of 64 2468 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e0acb0ce0c4386d90903c7c5b0811c31b17fe4f17f4c63d6ee8ec36b81ab0275.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e0acb0ce0c4386d90903c7c5b0811c31b17fe4f17f4c63d6ee8ec36b81ab0275.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:64
-